Cybersecurity

Last Thursday, Google cybersecurity researchers discovered and blocked a new Android malware named Lipizzan that can steal data from emails and messages, record phone calls, and take photos and videos of victims. Lipizzan is known as the intelligent two-step spyware tool that can be contracted through the Google Play Store and several other channels. The malware is said to appear as an inconspicuous app like a cleaner or backup program. This includes 20 other apps, surpassing Google Play security functions since it only begins infection when downloaded by the device. Google was able to stop the initial outbreak of the […]

According to news last Wednesday, free anti-virus protection will be provided by Russian security company Kaspersky Lab to users worldwide. In a blog published by Eugene Kaspersky, the free version of the antivirus offers basic system protection, including automatic updates, self-defense, quarantine, email, and file, among several initial features. The software is said to ensure protected online browsing against phishing and malicious files that can be run on a user’s system. Kaspersky states that the free anti-virus will not go head-to-head with its paid version. Although it offers basic protection, they believe it covers enough security grounds for systems. The […]

Researchers have released a free decryption tool to aid affected Petya ransomware users in recovering their data, according to news last Wednesday. Sources say the decryption tool can address original versions of Petya like GoldenEye, Green Petya, and Red Petya, but not the PetrWrap or NotPetya strains. After the NotPetya infection, ransomware originator Janus disclosed the master key for the strain. Malwarebytes cyber security researchers then took it upon themselves to analyze it and release a decryptor. Though the free decryptor helps users retrieve files, researchers warn of problems that may arise once it’s run. Tests revealed that the program […]

Sunnyvale, California — CrowdStrike® Inc. announced last Tuesday that they will release the most rapid and far-reaching search database for cybersecurity called the CrowdStrike Falcon Search Engine. Crowdstrike has made it their goal to develop the most comprehensive tool that can help users conduct thorough research investigation on cyber threats. It’s designed with an ascendable cloud-based structure that’s most suitable for cybersecurity searches. With over 51 billion security search activities daily, the CrowdStrike Falcon Search Engine is the biggest cyber threat database in the industry. It indexes in real-time, detecting over 560TB of malware within 700 million files. Having on-time […]

Riyadh, Saudi Arabia — Following a mandatory economic boycott on Qatar in June 5, some Qatar-related channels and websites were reported to have been unblocked on Monday in Saudi Arabia. The boycott came over allegations that Qatar was supporting terrorist groups. Saudi banned television channels like Al Jazeera which is state-funded by Qatar, as well as beIN sports channels. However, beIN sports channels and websites were back on Monday, though Al Jazeera was still blocked. According to the top royal adviser Saud al-Qahtani’s Twitter post, a technical error caused the unauthorized lifting of the ban and should be addressed soon. […]

Germany – According to news last Saturday, the German press reported a hacker nicknamed BestBuy was found guilty of controlling more than 9,000 routers under Deutsche Telekom by using a specialized Mirai IoT malware. In court, the hacker admitted to hijacking the routers, but explained that he never meant for them to stop working. This caused online disturbances to thousand of companies and households in Germany. Upon further investigation, BestBuy explained he was employed by an ISP based in Liberia to launch DDoS attacks on its competitors, earning him $10,000. German authorities did not publish BestBuy’s identity but referred to […]

A report on Saturday said Microsoft is legally pursuing the notorious Russian hacking organization known as Fancy Bear, seizing its central control servers to weaken espionage activities. The tech giant filed the lawsuit to gain control of over 70 global server control points used by Fancy Bear to stealthily deliver malware to computers. Upon getting legal control of the servers, the hackers will be disconnected from their victims and Microsoft will gain access to the roster of spies on the network. Fancy Bear is a hacking organization that’s supported by the Russian government. According to U.S. intelligence sources, the group […]

Russia — Last Saturday, Russia has ruled in favor of a law the bans the use of online dodging tools that enable citizens to visit blacklisted websites. The policy directs Roskomnadzor, Russia’s telecommunications guardian, to research a list of services that should be prohibited once they are proven to break the law. However, Russian internet organizations have opposed the law, saying it is too strict without any concrete justifications. The opposing groups also depend on the internet to access popular information that isn’t available in Russia. Back in June, authorities warned they would block encrypted messaging app Telegram following from […]

Last Friday, security backup company Symantec was reported to have erroneously removed a (transport layer security) TLS certificate based on security researcher Hanno Böck’s falsified private keys. Böck published a blog documenting how he tested TLS certificate companies, Symantec and Comodo. He forged private keys for both addresses and asked each provider to have the certificates revoked because the keys were compromised. When the providers replied, Comodo did not remove its certificate, while Symantec responded by completely revoking his list. Böck states revoking based on fake information also calls the company’s cryptographic expertise into question. In the past, Symantec has […]

In a report last Thursday, Iranian citizens Mohammed Reza Rezakhah and Mohammed Saeed Ajily were charged with a list of hacking offenses, including illegally stealing and selling U.S. military software to various Iranian institutions. Investigations revealed that the perpetrators began their malicious operations in 2007, with Ajily directing Rezakhah along with others to obtain software or crack restrictions that prevent them from using the programs. Ajily was known to frequently sell artillery software to Iranian military and government agencies. The offenders were reported to steal a missile software designed by Arrow-Tech engineering firm based in Vermont. The program, Projectile Rocket […]

Subscribe to Elegal

*Your email address will not be passed onto third parties, kept private and will only use your shared data to send the information you requested.
By subscribing, you agree to this website's
Privacy Policy and Terms of Use.
You may unsubscribe anytime.

Name

Email

Position

Organization

Contact Us

Need more information on Philippine laws and legal updates? Contact us at elegal@disini.ph

About Us

This blog is the embodiment of a vision we have at Disini & Disini (D&D) of an IT empowered citizenry where we, as a people, harness information available through the internet to bridge the gaps where there may be lapses. As part of our advocacy, we take full advantage of the accessibility of cyberspace by developing this blog.